kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Measure Allocation for Industrial Control Systems: Exploiting Systematic Search Techniques and Submodularity
KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0002-2045-5665
KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0001-9940-5929
Show others and affiliations
2020 (English)In: International Journal of Robust and Nonlinear Control, ISSN 1049-8923, E-ISSN 1099-1239, Vol. 30, no 11, p. 4278-4302Article in journal (Refereed) Published
Abstract [en]

To protect industrial control systems from cyberattacks, multiple layers of security measures need to be allocated to prevent critical security vulnerabilities. However, both finding the critical vulnerabilities and then allocating security measures in a cost‐efficient way become challenging when the number of vulnerabilities and measures is large. This paper proposes a framework that can be used once this is the case. In our framework, the attacker exploits security vulnerabilities to gain control over some of the sensors and actuators. The critical vulnerabilities are those that are not complex to exploit and can lead to a large impact on the physical world through the compromised sensors and actuators. To find these vulnerabilities efficiently, we propose an algorithm that uses the nondecreasing properties of the impact and complexity functions and properties of the security measure allocation problem to speed up the search. Once the critical vulnerabilities are located, the security measure allocation problem reduces to an integer linear program. Since integer linear programs are NP‐hard in general, we reformulate this problem as a problem of minimizing a linear set function subject to a submodular constraint. A polynomial time greedy algorithm can then be applied to obtain a solution with guaranteed approximation bound. The applicability of our framework is demonstrated on a control system used for regulation of temperature within a building.

Place, publisher, year, edition, pages
Wiley , 2020. Vol. 30, no 11, p. 4278-4302
Keywords [en]
Control Engineering, Reglerteknik
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-268917DOI: 10.1002/rnc.4375ISI: 000541068900008Scopus ID: 2-s2.0-85055057291OAI: oai:DiVA.org:kth-268917DiVA, id: diva2:1396163
Note

QC 20200225

Available from: 2020-02-25 Created: 2020-02-25 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

fulltext(1086 kB)480 downloads
File information
File name FULLTEXT01.pdfFile size 1086 kBChecksum SHA-512
e3275d9c25939969a5d427d0b2cd4a68bf7c4c7fba0943c3a4b8f0ee3f1189247fd14506cbde4eedba4113010ac3c530b956af431d22139ee3368d3399a74f91
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusElectronic full texthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-363605

Authority records

Miloševiç, JezdimirJohansson, Karl H.Sandberg, Henrik

Search in DiVA

By author/editor
Miloševiç, JezdimirJohansson, Karl H.Sandberg, Henrik
By organisation
Automatic Control
In the same journal
International Journal of Robust and Nonlinear Control
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 480 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 434 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf